CVE-2026-44717: Critical RCE in MCP Calculate Server Due to `eval()`
The National Vulnerability Database has disclosed CVE-2026-44717, a critical remote code execution (RCE) vulnerability in MCP Calculate Server, a mathematical calculation service. This flaw, rated 9.8 CVSS, stems from the insecure use of eval() to process mathematical expressions without adequate input sanitization. Attackers can leverage this to execute arbitrary code remotely, posing a severe risk to any system running the vulnerable service.
The vulnerability, categorized as CWE-94 (Improper Control of Generation of Code), affects versions of MCP Calculate Server prior to 0.1.1. The core issue is trusting user input directly within eval(), a classic mistake that consistently leads to RCE. This isn’t theoretical; it’s a direct path to system compromise.
Defenders must prioritize patching. The fix is available in version 0.1.1. Any organization using MCP Calculate Server needs to upgrade immediately. Leaving this unpatched is an open invitation for attackers to gain full control, bypassing standard security controls through application logic.
What This Means For You
- If your organization uses MCP Calculate Server, you need to check its version immediately. Any instance running prior to 0.1.1 is critically vulnerable to remote code execution. Patch to 0.1.1 without delay and review network access to these services. This isn't a complex exploit; it's a direct command injection.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-44717: MCP Calculate Server RCE via eval() injection
title: CVE-2026-44717: MCP Calculate Server RCE via eval() injection
id: scw-2026-05-15-ai-1
status: experimental
level: critical
description: |
Detects potential exploitation of CVE-2026-44717 by looking for common indicators of eval() injection within the URI query parameters of requests to the MCP Calculate Server. This vulnerability allows for remote code execution due to improper sanitization of input passed to eval().
author: SCW Feed Engine (AI-generated)
date: 2026-05-15
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44717/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- 'eval('
- 'exec('
- 'compile('
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44717 | RCE | MCP Calculate Server < 0.1.1 |
| CVE-2026-44717 | RCE | Vulnerable function: eval() without proper input sanitization |
| CVE-2026-44717 | Code Injection | MCP Calculate Server using SymPy library |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 15, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.